Microsoft Defender for Office 365 (MDO) safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools including Microsoft Teams, SharePoint Online, OneDrive for Business, and other Office clients. It provides Plan 1 (protection) and Plan 2 (investigation, hunting, and remediation) capabilities.
Detonation-based scanning of email attachments in a sandbox environment. Detects zero-day malware and previously unknown threats before delivery.
Time-of-click URL verification that scans and rewrites URLs in emails and Office documents. Blocks malicious links even after message delivery.
AI-based impersonation detection protects against BEC, domain spoofing, and user impersonation with configurable policies and safety tips.
Run realistic phishing simulations to test and train your users. Track click rates, credential compromise, and measure improvement over time.
Investigate email threats with filtering, timeline views, and export capabilities. Hunt for phishing campaigns, malware families, and delivery actions.
Automatically investigate alerts triggered by user submissions, ZAP actions, and policy violations. Take remediation actions with approval workflows.
Email and collaboration security labs. configure protection policies, simulate phishing attacks, and investigate business email compromise from end to end.
Create Safe Attachments policies with dynamic delivery mode, configure Safe Links URL scanning and rewriting policies, enable protection for internal senders, and validate effectiveness by testing with simulated malicious content in a pilot group.
Design a credential-harvesting phishing campaign using Attack Simulator, target specific user groups and departments, analyze click rates and credential submission metrics, assign security awareness training to susceptible users, and track completion rates.
Set up advanced anti-phishing policies with impersonation protection for executives, configure ZAP for email and Teams messages, create layered anti-spam and anti-malware policies, and validate email authentication with SPF, DKIM, and DMARC records.
Investigate a simulated BEC attack end-to-end: analyze email headers and authentication results, trace mail flow with message trace, identify compromised mailbox rules, review Threat Explorer data, apply soft-delete and hard-delete remediation actions, and create post-incident detection rules.